Menlo Report
   HOME

TheInfoList



OR:

The Menlo Report is a report published by the U.S.
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
Science and Technology Directorate,
Cyber Security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
Division that outlines an ethical framework for research involving
Information and Communications Technologies Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals) and computer ...
(ICT). The 17-page report was published on August 3, 2012. The following year, the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
published a 33-page companion reportD. Dittrich, E. Kenneally, and M. Bailey. "Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report", Tech. Report., U.S. Department of Homeland Security, Oct 2013. https://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCOMPANION-20120103-r731_1.pdf, https://www.impactcybertrust.org/link_docs/Menlo-Report-Companion.pdf that includes case studies that illustrate how the principles can be applied. The Menlo Report adapted the original
Belmont Report The ''Belmont Report'' is a 1978 report created by the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Its full title is the ''Belmont Report: Ethical Principles and Guidelines for the Protection o ...
principles (Respect for Persons,
Beneficence Beneficence may refer to: * Beneficence (hip-hop artist) * Beneficence, a synonym for philanthropy * Beneficence (ethics), a concept in medical ethics Medical ethics is an applied branch of ethics which analyzes the practice of clinical medic ...
, and Justice) to the context of
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
research & development, as well as adding a fourth principle, "Respect for Law and Public Interest." The Menlo Report was created under an informal,
grassroots A grassroots movement is one that uses the people in a given district, region or community as the basis for a political or continent movement. Grassroots movements and organizations use collective action from volunteers at the local level to imp ...
process that was catalyzed by the ethical issues raised in ICT
Computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
research. Discussions at conferences and in public discourse exposed growing awareness of
ethical Ethics is the philosophical study of moral phenomena. Also called moral philosophy, it investigates normative questions about what people ought to do or which behavior is morally right. Its main branches include normative ethics, applied e ...
debates in computer security research, including issues that existing oversight authorities (e.g.,
Institutional Review Boards An institutional review board (IRB), also known as an independent ethics committee (IEC), ethical review board (ERB), or research ethics board (REB), is a committee at an institution that applies research ethics by reviewing the methods proposed ...
) might have been unaware of or determined were beyond their purview. The Menlo Report is the core document stemming from the series of
working group A working group is a group of experts working together to achieve specified goals. Such groups are domain-specific and focus on discussion or activity around a specific subject area. The term can sometimes refer to an interdisciplinary collab ...
meetings that broached these issues in an attempt to pre-empt research harms and galvanize the community around common ethical principles and applications. This report proposes a framework for ethical guidelines for computer and
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
research, based on the principles set forth in the 1979
Belmont Report The ''Belmont Report'' is a 1978 report created by the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Its full title is the ''Belmont Report: Ethical Principles and Guidelines for the Protection o ...
, a seminal guide for ethical research in the
biomedical Biomedicine (also referred to as Western medicine, mainstream medicine or conventional medicine)
and
behavioral sciences Behavioural science is the branch of science concerned with human behaviour.Hallsworth, M. (2023). A manifesto for applying behavioural science. ''Nature Human Behaviour'', ''7''(3), 310-322. While the term can technically be applied to the st ...
. The Menlo Report describes how the three principles in the Belmont report can be applied in fields related to research about or involving information and communication technology. ICT research raises new challenges resulting from interactions between humans and communications technologies. In particular, today's ICT research contexts contend with
ubiquitously Omnipresence or ubiquity is the property of being present anywhere and everywhere. The term omnipresence is most often used in a religious context as an attribute of a deity or supreme being, while the term ubiquity is generally used to describe ...
connected network environments, overlaid with varied, often discordant legal regimes and social norms. The Menlo Report proposes the application of these principles to
information system An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, Information Processing and Management, store, and information distribution, distribute information. From a sociotechnical perspective, info ...
s security research although the researchers expect the proposed framework to be relevant to other disciplines, including those targeted by the Belmont report but now operating in more complex and interconnected contexts. The Menlo Report details four core ethical principles, three from the original Belmont Report. * respect for persons *
beneficence Beneficence may refer to: * Beneficence (hip-hop artist) * Beneficence, a synonym for philanthropy * Beneficence (ethics), a concept in medical ethics Medical ethics is an applied branch of ethics which analyzes the practice of clinical medic ...
*
justice In its broadest sense, justice is the idea that individuals should be treated fairly. According to the ''Stanford Encyclopedia of Philosophy'', the most plausible candidate for a core definition comes from the ''Institutes (Justinian), Inst ...
It has an additional principle - respect for law and public interest. The report explains each of these in the context of ICT research.


Principles of the Menlo Report

The Menlo Report attempts to summarize a set of basic principles to guide the identification and resolution of ethical problems arising in research of or involving ICT. The report believes that ICT has increasingly become integrated into individual and collective daily lives and affects our social interactions. It believes that the challenges of ICTR
risk assessment Risk assessment is a process for identifying hazards, potential (future) events which may negatively impact on individuals, assets, and/or the environment because of those hazards, their likelihood and consequences, and actions which can mitigate ...
is derived from these three factors: - The researcher-subject relationships, which tend to be disconnected, dispersed, and intermediated by technology - The proliferation of data sources and analytics, which can heighten risk incalculably - And the inherent overlap between research and operations. In order to properly apply any of the principles in the complex setting of ICT research, it deems that it is first necessary to perform a systematic and comprehensive stakeholder analysis. The proposed guidelines for ethical assessment of ICT Research are as follows: * Respect for Persons. Participation as a research subject is voluntary, and follows from
informed consent Informed consent is an applied ethics principle that a person must have sufficient information and understanding before making decisions about accepting risk. Pertinent information may include risks and benefits of treatments, alternative treatme ...
. Therefore, the research should treat individuals as
autonomous In developmental psychology and moral, political, and bioethical philosophy, autonomy is the capacity to make an informed, uncoerced decision. Autonomous organizations or institutions are independent or self-governing. Autonomy can also be defi ...
agents and respect their right to determine their own best interests, respect individuals who are not targets of research yet are impacted, Individuals with diminished autonomy who are incapable of deciding for themselves and are entitled to protection. * Beneficence. Do not harm. Maximize probable benefits and minimize probable harms. Systematically assess both risk of harm and benefit. * Justice. Each person deserves equal consideration in how to be treated, and the benefits of research should be fairly distributed according to individual need, effort, societal contribution, and merit. Selection of subjects should be fair, and burdens should be allocated equitably across impacted subjects. * Respect for Law and Public Interest. Engage in legal
due diligence Due diligence is the investigation or exercise of care that a reasonable business or person is normally expected to take before entering into an agreement or contract with another party or an act with a certain standard of care. Due diligence ...
and be transparent in methods and results. Be accountable for actions.


Implementation of the Principles of the Menlo Report


Respect for Persons

Appropriate application of the four principles requires that
Stakeholder analysis Stakeholder analysis in conflict resolution, business administration, Environmental health, environmental health sciences decision making, industrial ecology, public administration, and project management is the process of assessing a system and po ...
must first be performed. Thorough stakeholder analysis is important to identify: the correct entity(s) from whom to seek informed consent; the party(s) who bear the burdens or face risks of research; the party(s) who will benefit from research activity; and, the party(s) who are critical to
mitigation Mitigation is the reduction of something harmful that has occurred or the reduction of its harmful effects. It may refer to measures taken to reduce the harmful effects of hazards that remain ''in potentia'', or to manage harmful incidents that ...
in the event that chosen risks come to fruition.
Informed consent Informed consent is an applied ethics principle that a person must have sufficient information and understanding before making decisions about accepting risk. Pertinent information may include risks and benefits of treatments, alternative treatme ...
assures that research subjects who are put at risk through their involvement in research understand the proposed research, the purpose for which they are being asked to participate in research, the anticipated benefits of the research, and the risks of the subject's participation in that research. They are then free to choose to accept or decline participation. These risks may involve
identifiability In statistics, identifiability is a property which a model must satisfy for precise inference to be possible. A model is identifiable if it is theoretically possible to learn the true values of this model's underlying parameters after obtaining a ...
in research data but can extend to other potential harms.


Beneficence

Assessing potential research harm involves considering risks related to information and
information system An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, Information Processing and Management, store, and information distribution, distribute information. From a sociotechnical perspective, info ...
s as a whole. Information-centric harms stem from contravening
data confidentiality Confidentiality involves a set of rules or a promise sometimes executed through confidentiality agreements that limits the access to or places restrictions on the distribution of certain types of information. Legal confidentiality By law, law ...
, availability, and integrity requirements. This also includes infringing rights and interests related to privacy and reputation, and
psychological Psychology is the scientific study of mind and behavior. Its subject matter includes the behavior of humans and nonhumans, both consciousness, conscious and Unconscious mind, unconscious phenomena, and mental processes such as thoughts, feel ...
, financial, and physical well-being. Some personal information is more sensitive than others. Very sensitive information includes government-issued identifiers such as
Social Security Welfare spending is a type of government support intended to ensure that members of a society can meet basic human needs such as food and shelter. Social security may either be synonymous with welfare, or refer specifically to social insurance ...
, driver's license, health care, and financial account numbers, and
biometric Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
records. A combination of personal information is typically more sensitive than a single piece of personal information.
Basic research Basic research, also called pure research, fundamental research, basic science, or pure science, is a type of scientific research with the aim of improving scientific theories for better understanding and prediction of natural or other phenome ...
typically has long-term benefits to society through the advancement of scientific knowledge. Applied research generally has immediately visible benefits. Operational improvements include improved
search algorithm In computer science, a search algorithm is an algorithm designed to solve a search problem. Search algorithms work to retrieve information stored within particular data structure, or calculated in the Feasible region, search space of a problem do ...
s, new queuing techniques, new
user interface In the industrial design field of human–computer interaction, a user interface (UI) is the space where interactions between humans and machines occur. The goal of this interaction is to allow effective operation and control of the machine fro ...
capabilities. The principle of balancing risks and benefits involves weighing the burdens of research and risks of harm to stakeholders (direct or indirect), against the benefits that will accrue to the larger society as a result of the research activity. The application of this principle is perhaps the most complicated because of the characteristics of ICTR. This compels us to revisit the existing guidance on
research design Research design refers to the overall strategy utilized to answer research questions. A research design typically outlines the theories and models underlying a project; the research question(s) of a project; a strategy for gathering data and info ...
and ethical evaluation. Circumstances may arise where significant harm occurs despite attempts to prevent or minimize risks, and additional harm-mitigating steps are required. ICT researchers should have (a) a response plan for reasonably foreseeable harms, and (b) a general
contingency plan A contingency plan, or alternate plan, also known colloquially as Plan B, is a plan devised for an outcome other than in the usual (expected) plan. It is often used for risk management for an exceptional risk that, though unlikely, would have cata ...
for low probability and high impact risks.


Justice

The report believes that research should be designed and conducted equitably between and across stakeholders, distributing research benefits and burdens. Research directed at ICT itself may be predicated on exploiting an attribute (e.g.,
economically disadvantaged The "disadvantaged" is a generic term for individuals or groups of people who: * Face special problems such as physical or mental disability * Lack money or economic supportKingdom of Nepal: Economic and Social Inclusion of the Disadvantaged P ...
) of persons which is not related to the research purpose. Hence, it can facilitate arbitrary targeting by proxy. On the other hand, the opacity and attribution challenges associated with ICT can inherently facilitate unbiased selection in all research as it is often impracticable to even discern those attributes.


Respect for Law and Public Interest

Applying respect for law and public interest through
compliance Compliance can mean: Healthcare * Compliance (medicine), a patient's (or doctor's) adherence to a recommended course of treatment * Compliance (physiology), the tendency of a hollow organ to resist recoil toward its original dimensions (this is a s ...
assures that researchers engage in legal due diligence. Although ethics may be implicitly embedded in many established laws, they can extend beyond those strictures and address obligations that relate to reputation and individual well-being, for example. Transparency is an application of respect for law and public interest that can encourage assessing and implementing
accountability In ethics and governance, accountability is equated with answerability, culpability, liability, and the expectation of account-giving. As in an aspect of governance, it has been central to discussions related to problems in the public secto ...
. Accountability ensures that researchers behave responsibly, and ultimately it galvanizes trust in ICTR. Transparency-based accountability helps researchers, oversight entities, and other stakeholders avoid guesswork and incorrect
inference Inferences are steps in logical reasoning, moving from premises to logical consequences; etymologically, the word '' infer'' means to "carry forward". Inference is theoretically traditionally divided into deduction and induction, a distinct ...
s regarding if, when, and how ethical principles are being addressed. Transparency can expose ethical tensions, such as the researcher's interest in promoting openness and
reproducibility Reproducibility, closely related to replicability and repeatability, is a major principle underpinning the scientific method. For the findings of a study to be reproducible means that results obtained by an experiment or an observational study or ...
versus withholding research findings in the interests of protecting a vulnerable population.


Companion Report

The Companion Report is a complement to the Menlo Report that details the principles and applications in more detail and illustrates their implementation in real and synthetic case studies. It is intended for the benefit of society, by showing the potential for harm to humans (direct or indirect) and by helping researchers understand and preempt or minimize these risks in the lifecycle of their research.


See also

*
Belmont Report The ''Belmont Report'' is a 1978 report created by the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Its full title is the ''Belmont Report: Ethical Principles and Guidelines for the Protection o ...


References

*M. Bailey, D. Dittrich, E. Kenneally and D. Maughan,
The Menlo Report
" in ''IEEE Security & Privacy,'' vol. 10, no. 2, pp. 71–75, March–April 2012., doi: 10.1109/MSP.2012.52, (article summary of Menlo Report). {{Reflist United States Department of Homeland Security